一段調用遊戲call的代碼

  1. 這段代碼是注入的DLL中的一個鍵盤鉤子裏的函數
  2. ULONG qqgroup15508958;
  3. static LRESULT CALLBACK HookProc(int nCode, WPARAM wParam, LPARAM lParam) 
  4. {
  5.     if (HC_ACTION == nCode)
  6.     {
  7.         if (wParam == VK_ADD)
  8.         {
  9.             if ((lParam  &  0x80000000  )==0)
  10.             {
  11.                  qqgroup15508958=0x00452e98;//喫血
  12.                 _asm
  13.                 {//其它功能call都可以這樣實現
  14.                     pushad
  15.                         mov eax,0x00D91FE0
  16.                         //mov ecx,0x0042ABE4
  17.                         mov edx,0x00453028 
  18.                         call qqgroup15508958
  19.                         popad
  20.                 }
  21.             }
  22.         }
  23.         else if (wParam == VK_SUBTRACT)
  24.         {
  25.             if ((lParam  &  0x80000000  )==0)
  26.             {
  27.                  qqgroup15508958=0x00452e98;//喝藍           
  28.                    _asm
  29.                 {//其它功能call都可以這樣實現
  30.                     pushad
  31.                         mov eax,0x00D91FE0
  32.                         //mov ecx,0x0042ABE4
  33.                         mov edx,0x00453040 
  34.                         call qqgroup15508958
  35.                         popad
  36.                 }
  37.             }
  38.         }
  39.         else if (wParam == VK_F1)
  40.         {
  41.             if ((lParam  &  0x80000000  )==0)
  42.             {
  43.                  qqgroup15508958=0x00452e98;//回城
  44.                 _asm
  45.                 {//其它功能call都可以這樣實現
  46.                     pushad
  47.                         mov eax,0x00D91FE0
  48.                         //mov ecx,0x0042ABE4
  49.                         mov edx,0x0045305C 
  50.                         call qqgroup15508958
  51.                         popad
  52.                 }
  53.             }
  54.         }
  55.         else if (wParam == VK_F2)
  56.         {
  57.             if ((lParam  &  0x80000000  )==0)
  58.             {
  59.                  qqgroup15508958=0x00452DF8;//冰
  60.                 _asm
  61.                 {//其它功能call都可以這樣實現
  62.                     pushad
  63.                         mov eax,0x00D91FE0
  64.                         mov ecx,0x0045307C
  65.                         mov edx,0x00000001 
  66.                         call qqgroup15508958
  67.                         popad
  68.                 }
  69.             }
  70.         }
  71.         else if (wParam == VK_F3)
  72.         {
  73.             if ((lParam  &  0x80000000  )==0)
  74.             {
  75.                  qqgroup15508958=0x00452DF8;  //火                                                                                          
  76.                  _asm
  77.                 {//其它功能call都可以這樣實現
  78.                     pushad
  79.                         mov eax,0x00D91FE0
  80.                         mov ecx,0x0045309C
  81.                         mov edx,0x00000002 
  82.                         call qqgroup15508958
  83.                         popad
  84.                 }
  85.             }
  86.         }
  87.     }
  88.     return CallNextHookEx( g_hHookWinProc, nCode, wParam, lParam); 
  89. }
發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章